Providing Secure Wireless Network Access
Granted: April 10, 2025
Application Number:
20250119739
Techniques for securely accessing a computer network are described. An access provider sends network access credentials to an access management device. Upon receiving the credentials, the access management device generates an image key that embeds the credentials. The access management device then presents the image key to a client device. The client device receives the image key and extracts the credentials from within the image key. The client device transmits the credentials to the…
TRAINING DATA COLLECTION AND EVALUATION FOR FINE-TUNING A MACHINE-LEARNING MODEL FOR AUTOMATIC SOAP NOTE GENERATION
Granted: April 10, 2025
Application Number:
20250118398
Techniques are disclosed for automatically generating Subjective, Objective, Assessment and Plan (SOAP) notes. Particularly, techniques are disclosed for training data collection and evaluation for automatic SOAP note generation. Training data is accessed, and evaluation process is performed on the training data to result in evaluated training data. A fine-tuned machine-learning model is generated using the evaluated training data. The fine-tuned machine-learning model can be used to…
DISTANCE-BASED LOGIT VALUES FOR NATURAL LANGUAGE PROCESSING
Granted: April 10, 2025
Application Number:
20250117591
Techniques for using logit values for classifying utterances and messages input to chatbot systems in natural language processing. A method can include a chatbot system receiving an utterance generated by a user interacting with the chatbot system. The chatbot system can input the utterance into a machine-learning model including a set of binary classifiers. Each binary classifier of the set of binary classifiers can be associated with a modified logit function. The method can also…
SYSTEM AND TECHNIQUES FOR HANDLING LONG TEXT FOR PRE-TRAINED LANGUAGE MODELS
Granted: April 10, 2025
Application Number:
20250117585
In some aspects, a computing device may receive, at a data processing system, a set of utterances for training or inferencing with a named entity recognizer to assign a label to each token piece from the set of utterances. The computing device may determine a length of each utterance in the set and when the length of the utterance exceeds a pre-determined threshold of token pieces: dividing the utterance into a plurality of overlapping chunks of token pieces; assigning a label together…
System And Method For Recording User Actions And Resubmitting User Actions For A Graphical User Interface
Granted: April 10, 2025
Application Number:
20250117230
Techniques for recording submissions of a user actions in relation to interface elements of a GUI for replay are disclosed. Data arguments generated in response to the user actions required for executing a command associated with the user actions are recorded. A system monitors execution of an application. The system detects a command or action that corresponds to submission of a user action in relation to target interface elements displayed by a GUI. When the system detects the command,…
ONBOARDING OF CUSTOMERS FROM SINGLE TENANT TO MULTI-TENANT CLOUD-NATIVE INTEGRATION SERVER
Granted: April 10, 2025
Application Number:
20250117208
Techniques are disclosed herein for onboarding users from a single tenant cloud environment to a multi-tenant cloud environment. In one aspect, a method is provided that includes in response to an eligibility status check indicating that a first cloud service instance running a first version of a cloud service in a first cloud environment is eligible for the upgrade, exporting a copy of data from the first cloud service instance to a common storage device, provisioning a second cloud…
Defining And Using Reusable Modules To Generate Form Control Code
Granted: April 3, 2025
Application Number:
20250110713
Techniques for defining and using reusable modules to generate form control code are disclosed, including: displaying a form control implementation interface for applying form control functions to forms; receiving via the form control implementation interface: a first user input selecting a form control function of the form control functions; a second user input selecting one or more input parameters, for the form control function, that are to be extracted from the target form; a third…
NETWORK ENCRYPTION BASED ON TRAFFIC BETWEEN SOURCE AND DESTINATION
Granted: April 3, 2025
Application Number:
20250112898
The present disclosure relates to intelligent network encryption of traffic between a source and a destination. In an example, a network element receives, during a session between the source and the destination, first traffic exchanged between the source and the destination. The network element determines whether a traffic exchange between the source and the destination is expected to be secured by at least one of the source or the destination at any of a network layer, a transport…
INTEGRATED TRANSITION CONTROL CENTER
Granted: April 3, 2025
Application Number:
20250110933
Systems, methods, and machine-readable media to migrate data from source databases to target databases are disclosed. Data may be received, relating to the source databases and the target databases. For each source database, a migration assessment may be generated based on analyzing the data, and a migration method may be selected. A migration plan that specifies a parallel migration of a set of databases to the target databases may be created, with a first migration method to migrate a…
BINARY DETECTION IN SOFTWARE
Granted: April 3, 2025
Application Number:
20250110854
A method includes disassembling a reference binary of a library to generate a control flow graph of the referenced binary, normalizing the control flow graph to generate a normalized graph, traversing the normalized graph to generate execution traces from the normalized graph, and generating library vector embeddings. Generating library vector embeddings includes, for each execution trace of at least a subset of the execution traces, processing the execution trace by a vector embedding…
Perspective-Preserving Seamless Application Switching
Granted: April 3, 2025
Application Number:
20250109960
Techniques for perspective-preserving seamless application switching are disclosed. A system may display a first interface using a first application. The first interface includes interface elements representing a plurality of objects. The system may detect a zoom-in command, received by the first application, requesting a particular zoom level for a first interface element, corresponding to a first object in the first plurality of objects. The system may determine that the requested zoom…
Platform-Agnostic Compute Instance Launches
Granted: March 27, 2025
Application Number:
20250106275
A technique may include receiving, by a management service a plurality of instance configurations from a client device. The technique may then include receiving, by the management service, information identifying a launch request for a compute instance. The technique may include determining, by the management service, one or more candidate shapes for the compute instance based at least in part on the plurality of instance configurations. The technique may include selecting, by the…
TECHNIQUES FOR ESTABLISHING TRUST IN A CLUSTER OF EDGE DEVICES
Granted: March 27, 2025
Application Number:
20250106006
Techniques are disclosed to establish trust in a cluster of edge devices. An edge device cloud service can associate a first cloud-computing edge device with a fleet of cloud-computing edge devices and provision the first cloud-computing edge device with a master encryption key. The edge device cloud service can associate a second cloud-computing edge device with the fleet and provision the second cloud-computing edge device with the master encryption key and the first public encryption…
Error Prediction Using Database Validation Rules and Machine Learning
Granted: March 27, 2025
Application Number:
20250103584
Embodiments predict errors using database validation rules. Validation rules can be defined that include business logic for validating transactions performed on a database with a data model. Transactions can be performed using the database, where the database is in a post-transaction state after performance of the transactions. The database can be validated in the post-transaction state by performing the defined business logic for a subset of validation rules, where at least one…
Incremental Stack Walking
Granted: March 27, 2025
Application Number:
20250103467
Techniques for incremental stack walking are disclosed, including: performing a stack walk of a runtime stack, at least by traversing the runtime stack from a current frame to a root frame, to obtain a set of stack walking results; storing a cache of the set of stack walking results; and installing, on the runtime stack, a marker frame that marks a boundary of stack frames represented by the set of stack walking results.
Script-Based Runtime Assembly Of Object Graphs Using Native Instructions Compiled By An Ahead-Of-Time Compiler
Granted: March 27, 2025
Application Number:
20250103309
Techniques for script-based runtime assembly of object graphs using native instructions compiled by an ahead-of-time compiler are disclosed, including: generating, based on a data structure that defines a business process, a script including instructions for assembling an object graph that represents relationships between objects used by the business process; obtaining, at runtime by a business process execution engine compiled to native instructions by an ahead-of-time compiler, the…
FIELD EXTRACTION OF HETEROGENEOUS LOG RECORDS WITH RECURSIVE SUB PARSING AT INGEST TIME
Granted: March 27, 2025
Application Number:
20250103307
A system and computer-implemented method for a log analytics system that can configure, collect, parse, and analyze log records in an efficient manner. Log records are accessed, each of the log records is associated with a log source. A base parser is identified for parsing a log record based on a type of the log record indicated in the log source. The log record is parsed using the base parser to extract base field values corresponding to base fields. A base-parsed log record is…
Intelligent Event Management
Granted: March 20, 2025
Application Number:
20250094249
Techniques for managing events that record occurrences in a computing environment are disclosed. The system identifies events, and the system applies event processing mechanisms to the events. The event processing mechanisms generate incidents to represent the events. The system presents an interface that demonstrates how the events are mapped to the incidents. A user may interact with the interface to modify the event processing mechanisms and/or define new event processing mechanisms.…
AUTOMATIC DETECTION OF DESERIALIZATION ATTACKS WITH MARKOV CHAINS
Granted: March 20, 2025
Application Number:
20250094576
A method for detecting a deserialization attack may include identifying, in a byte stream, a class name corresponding to a class, generating, for the class, a feature vector, generating, by applying a benign deserialization model to the feature vector, a benign probability window, generating, by applying a malicious deserialization model to the feature vector, a malicious probability window, comparing the benign probability window and the malicious probability window to obtain a…
ROUTING ENGINE FOR LLM-BASED DIGITAL ASSISTANT
Granted: March 20, 2025
Application Number:
20250094390
Techniques are disclosed herein for routing an utterance to action for a digital assistant with generative artificial intelligence. An input query comprising particular data can be received from a user. An action and a set of input argument slots within a schema associated with the action can be identified based on the input query. The input argument slots can be filled by determining whether one or more parameters are derivable from the particular data and filling the input argument…